Putu Ariani, I. Gede, Bagastia Widi Atmaja, Kadek Sukma Jayanti, G. Ayu, A. Dewi, Gede Arna, Jude Saskara, Made Edy Listartha
{"title":"社交媒体网站上钓鱼工具的比较分析","authors":"Putu Ariani, I. Gede, Bagastia Widi Atmaja, Kadek Sukma Jayanti, G. Ayu, A. Dewi, Gede Arna, Jude Saskara, Made Edy Listartha","doi":"10.31937/ti.v15i1.2920","DOIUrl":null,"url":null,"abstract":"Social networks, often referred to as social media are a form of information technology development. Social networks are used by society in obtaining information, being a means of long-distance communication, as well as distributing information. However, behind the development of social media which has experienced significant developments, there are problems related to information security. Vulnerable to leakage of credential data and fraud becomes a negative impact due to the development of social media, one of the scams that often occurs on social media is phishing. Such scams are attempts to obtain, steal, or dig into someone's data through emails, text messages, and social media posts. A kun social media is targeted by perpetrators of phishing crimes because the account consists of sensitive data of social media users, one of the social media accounts that can be exposed the phishing attack is Facebook. Therefore, the problem studied in this study is how criminals use three different types of phishing tools to commit crimes. Social media users now understand how phishing works, where criminals use phishing tools to access social media accounts. The data obtained from this study is a comparison of the performance of phishing tools used in committing information crimes on the Facebook social media site, with the existence of these tools that are easy to use for phishing can be a supporting factor for perpetrators of phishing to user accounts freely.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Comparative Analysis of Phishing Tools on Social Media Sites\",\"authors\":\"Putu Ariani, I. Gede, Bagastia Widi Atmaja, Kadek Sukma Jayanti, G. Ayu, A. Dewi, Gede Arna, Jude Saskara, Made Edy Listartha\",\"doi\":\"10.31937/ti.v15i1.2920\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Social networks, often referred to as social media are a form of information technology development. Social networks are used by society in obtaining information, being a means of long-distance communication, as well as distributing information. However, behind the development of social media which has experienced significant developments, there are problems related to information security. Vulnerable to leakage of credential data and fraud becomes a negative impact due to the development of social media, one of the scams that often occurs on social media is phishing. Such scams are attempts to obtain, steal, or dig into someone's data through emails, text messages, and social media posts. A kun social media is targeted by perpetrators of phishing crimes because the account consists of sensitive data of social media users, one of the social media accounts that can be exposed the phishing attack is Facebook. Therefore, the problem studied in this study is how criminals use three different types of phishing tools to commit crimes. Social media users now understand how phishing works, where criminals use phishing tools to access social media accounts. The data obtained from this study is a comparison of the performance of phishing tools used in committing information crimes on the Facebook social media site, with the existence of these tools that are easy to use for phishing can be a supporting factor for perpetrators of phishing to user accounts freely.\",\"PeriodicalId\":347196,\"journal\":{\"name\":\"Ultimatics : Jurnal Teknik Informatika\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Ultimatics : Jurnal Teknik Informatika\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31937/ti.v15i1.2920\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ultimatics : Jurnal Teknik Informatika","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31937/ti.v15i1.2920","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comparative Analysis of Phishing Tools on Social Media Sites
Social networks, often referred to as social media are a form of information technology development. Social networks are used by society in obtaining information, being a means of long-distance communication, as well as distributing information. However, behind the development of social media which has experienced significant developments, there are problems related to information security. Vulnerable to leakage of credential data and fraud becomes a negative impact due to the development of social media, one of the scams that often occurs on social media is phishing. Such scams are attempts to obtain, steal, or dig into someone's data through emails, text messages, and social media posts. A kun social media is targeted by perpetrators of phishing crimes because the account consists of sensitive data of social media users, one of the social media accounts that can be exposed the phishing attack is Facebook. Therefore, the problem studied in this study is how criminals use three different types of phishing tools to commit crimes. Social media users now understand how phishing works, where criminals use phishing tools to access social media accounts. The data obtained from this study is a comparison of the performance of phishing tools used in committing information crimes on the Facebook social media site, with the existence of these tools that are easy to use for phishing can be a supporting factor for perpetrators of phishing to user accounts freely.